A vulnerability in Oxygen <= 1.1.3 (O2PHP Bulletin Board) allows an attacker to inject arbitrary SQL commands via the 'viewthread.php' script. This can be exploited to manipulate SQL queries by e.g. injecting arbitrary 'uid' values. This can be exploited to disclose the MD5 hash of a user's password.
dicshunary 0.1 alpha is prone to a remote file inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
This exploit allows an attacker to execute arbitrary code on the vulnerable server by including a remote file. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'mosConfig_absolute_path' parameter in the 'components/com_reporter/reporter.logic.php' script.
An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.
A vulnerability exists in mxBB calsnails module 1.06 which allows a remote attacker to include a file from a remote host. The vulnerability is due to the 'module_root_path' parameter in 'includes/mx_common.php' script not properly sanitized before being used in a 'include_once' function call. This can be exploited to include arbitrary files from remote hosts by e.g. passing a URL in the 'module_root_path' parameter.
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The attacker can inject arbitrary SQL code in the vulnerable parameter 'edit' of the 'matchdetail.php' script. This can be used to extract data from the database, modify data, delete data, or even execute administration operations on the database.
The vulnerability exists due to insufficient sanitization of user-supplied input in 'editpoll.php' script. A remote attacker can send a specially crafted HTTP request with malicious SQL statements to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication and gain access to the administrative panel.
The textview.php page in DoSePa does not properly sanitize the $_GET['file'] value; this allows an attacker to view any file to which the server has read rights.
The mg.applanix version 1.3.1 is vulnerable to Remote File Inclusion (RFI) vulnerability. An attacker can exploit this vulnerability by sending a malicious URL in the 'apx_root_path' parameter of the vulnerable scripts. This can allow the attacker to execute arbitrary code on the vulnerable server.
Geeklog is prone to multiple input-validation vulnerabilities. The issues include cross-site scripting and SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.